Analysis
-
max time kernel
32s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
winrar-x64-624d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
winrar-x64-624d.exe
Resource
win10v2004-20240221-en
General
-
Target
winrar-x64-624d.exe
-
Size
3.6MB
-
MD5
9985a56f0e199363882968c4fd10ab85
-
SHA1
60b9502bd4815583cb71499c6472cd735ec56c1c
-
SHA256
51dd381b96b620ff0b1a5e5f2f6a430575c4d528f0d80d61ed15791407d7d0d9
-
SHA512
d14b537336b78ab97e1d40780d49e6e9a61975dcb5afe5995240ae9968b312566f34e8e57ffd69dcc71d533b654bc0bcfedd44652aa1a4275aa483dac956c51f
-
SSDEEP
98304:AwBOBfK5UNe0Ti01WysMqIpmuOK/OJdQpKmADMpfs7LPtBBIOMil:Aw/6s0TifysMsjwpfsvP5IOB
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\WinRAR\RarExtPackage.msix winrar-x64-624d.exe File created C:\Program Files\WinRAR\Zip.SFX winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\RarFiles.lst winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\7zxa.dll winrar-x64-624d.exe File created C:\Program Files\WinRAR\WinRAR.exe winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\WinRAR.exe winrar-x64-624d.exe File created C:\Program Files\WinRAR\winrar.lng winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\Zip.SFX winrar-x64-624d.exe File created C:\Program Files\WinRAR\WinRAR.chm winrar-x64-624d.exe File created C:\Program Files\WinRAR\License.txt winrar-x64-624d.exe File created C:\Program Files\WinRAR\Uninstall.exe winrar-x64-624d.exe File created C:\Program Files\WinRAR\7zxa.dll winrar-x64-624d.exe File created C:\Program Files\WinRAR\Default.SFX winrar-x64-624d.exe File created C:\Program Files\WinRAR\Zip64.SFX winrar-x64-624d.exe File created C:\Program Files\WinRAR\WhatsNew.txt winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\Uninstall.exe winrar-x64-624d.exe File created C:\Program Files\WinRAR\Rar.exe winrar-x64-624d.exe File created C:\Program Files\WinRAR\Rar.txt winrar-x64-624d.exe File created C:\Program Files\WinRAR\Uninstall.lst winrar-x64-624d.exe File created C:\Program Files\WinRAR\UnRAR.exe winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\Default64.SFX winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\WinCon.SFX winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\License.txt winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\Uninstall.lst winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\Default.SFX winrar-x64-624d.exe File created C:\Program Files\WinRAR\WinCon64.SFX winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\Zip64.SFX winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\RarExtPackage.msix winrar-x64-624d.exe File created C:\Program Files\WinRAR\Resources.pri winrar-x64-624d.exe File created C:\Program Files\WinRAR\rar.lng winrar-x64-624d.exe File created C:\Program Files\WinRAR\Descript.ion winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\Rar.exe winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\Order.htm winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\rar.lng winrar-x64-624d.exe File created C:\Program Files\WinRAR\rarext.lng winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-32.png winrar-x64-624d.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-64.png winrar-x64-624d.exe File created C:\Program Files\WinRAR\rarnew.dat uninstall.exe File created C:\Program Files\WinRAR\__tmp_rar_sfx_access_check_259416464 winrar-x64-624d.exe File created C:\Program Files\WinRAR\Order.htm winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\WinCon64.SFX winrar-x64-624d.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-48.png winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\rarext.lng winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\WinRAR.chm winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\Rar.txt winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\WhatsNew.txt winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\UnRAR.exe winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\winrar.lng winrar-x64-624d.exe File created C:\Program Files\WinRAR\RarFiles.lst winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\Resources.pri winrar-x64-624d.exe File created C:\Program Files\WinRAR\Default64.SFX winrar-x64-624d.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-32.png winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-48.png winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR winrar-x64-624d.exe File created C:\Program Files\WinRAR\ReadMe.txt winrar-x64-624d.exe File created C:\Program Files\WinRAR\RarExt.dll winrar-x64-624d.exe File created C:\Program Files\WinRAR\RarExtInstaller.exe winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\RarExtInstaller.exe winrar-x64-624d.exe File created C:\Program Files\WinRAR\uninstall.lng winrar-x64-624d.exe File created C:\Program Files\WinRAR\zipnew.dat uninstall.exe File opened for modification C:\Program Files\WinRAR\RarExt.dll winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\RarExt32.dll winrar-x64-624d.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-64.png winrar-x64-624d.exe File created C:\Program Files\WinRAR\RarExt32.dll winrar-x64-624d.exe -
Executes dropped EXE 1 IoCs
pid Process 2860 uninstall.exe -
Loads dropped DLL 9 IoCs
pid Process 1220 winrar-x64-624d.exe 1232 Process not Found 1232 Process not Found 2860 uninstall.exe 2860 uninstall.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found -
Modifies system executable filetype association 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR uninstall.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ = "C:\\Program Files\\WinRAR\\rarext.dll" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ThreadingModel = "Apartment" uninstall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main winrar-x64-624d.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zip uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\ = "WinRAR-Archiv" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rev uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r23\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r00\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r12 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r17 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zip\ShellNew uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xxe\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\ = "RAR-Wiederherstellungs-Volumen" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r14\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.001\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r07 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.arj\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lha\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r09\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r20\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r01\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r26\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bz uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r10\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r24 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r24\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r12\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r15\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\ = "WinRAR-ZIP-Archiv" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r03\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r13 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r23 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.001 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open\command\ = "\"C:\\Program Files\\WinRAR\\WinRAR.exe\" \"%1\"" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r18\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r27\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zipx uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r25\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tgz\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.txz\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r00 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tar\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tzst uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r19 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.uue\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rar uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r03 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.zip\ShellNew\FileName = "C:\\Program Files\\WinRAR\\zipnew.dat" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tbz uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r08\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zst uninstall.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1000 chrome.exe 1000 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe Token: SeShutdownPrivilege 1000 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe 1000 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1220 winrar-x64-624d.exe 1220 winrar-x64-624d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2860 1220 winrar-x64-624d.exe 28 PID 1220 wrote to memory of 2860 1220 winrar-x64-624d.exe 28 PID 1220 wrote to memory of 2860 1220 winrar-x64-624d.exe 28 PID 1000 wrote to memory of 1688 1000 chrome.exe 31 PID 1000 wrote to memory of 1688 1000 chrome.exe 31 PID 1000 wrote to memory of 1688 1000 chrome.exe 31 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2880 1000 chrome.exe 33 PID 1000 wrote to memory of 2808 1000 chrome.exe 34 PID 1000 wrote to memory of 2808 1000 chrome.exe 34 PID 1000 wrote to memory of 2808 1000 chrome.exe 34 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35 PID 1000 wrote to memory of 2080 1000 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\winrar-x64-624d.exe"C:\Users\Admin\AppData\Local\Temp\winrar-x64-624d.exe"1⤵
- Drops file in Program Files directory
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files\WinRAR\uninstall.exe"C:\Program Files\WinRAR\uninstall.exe" /setup2⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Registers COM server for autorun
- Modifies registry class
PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef57b9758,0x7fef57b9768,0x7fef57b97782⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1288,i,10829129431478546204,9279008706195408281,131072 /prefetch:22⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1288,i,10829129431478546204,9279008706195408281,131072 /prefetch:82⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1636 --field-trial-handle=1288,i,10829129431478546204,9279008706195408281,131072 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1288,i,10829129431478546204,9279008706195408281,131072 /prefetch:12⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2304 --field-trial-handle=1288,i,10829129431478546204,9279008706195408281,131072 /prefetch:12⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3236 --field-trial-handle=1288,i,10829129431478546204,9279008706195408281,131072 /prefetch:22⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1160 --field-trial-handle=1288,i,10829129431478546204,9279008706195408281,131072 /prefetch:12⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4012 --field-trial-handle=1288,i,10829129431478546204,9279008706195408281,131072 /prefetch:12⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3964 --field-trial-handle=1288,i,10829129431478546204,9279008706195408281,131072 /prefetch:82⤵PID:796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3720 --field-trial-handle=1288,i,10829129431478546204,9279008706195408281,131072 /prefetch:12⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3356 --field-trial-handle=1288,i,10829129431478546204,9279008706195408281,131072 /prefetch:12⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3380 --field-trial-handle=1288,i,10829129431478546204,9279008706195408281,131072 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3384 --field-trial-handle=1288,i,10829129431478546204,9279008706195408281,131072 /prefetch:12⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2816
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD5814c44fa7a4d5259a6310bee336ef0c7
SHA1cf766a6c9a402e4f7637b278ad31dd0087cfc8c6
SHA256042573e0ea9335e29da34ff7b93b6dfbd5bf6144d3ec29b5babc7a04e8a8e459
SHA51299ff21e5f443af94fd1494d160ac6963630bf162312c529f6d3d86f79fb0c30c80a9cc5ca79d703aaa81f9bd5200806fd7a60385a6eeec3377cc6e3fea54ca89
-
Filesize
145KB
MD510d16e205403edcffb0a1d6a9c9419e0
SHA1618f515a29e76ee8976c6338a2013c56c0212fc1
SHA2562b70b81980bde45521bf7e576682d0b37fa4171c4d8c6f68cb22e0b54a4f55ec
SHA512efcf75a612740efd9deb60527a505b72a16ea0b7a64bd642f7d3e50b83ce843f25a0a6dbbbd4a47506091d0ffd28a3c6c52f2b34657415306250c0d56272fbe2
-
Filesize
392KB
MD5384a46aa1bb4eef76100260b91d598bf
SHA1589e7e13eb396188d97a63c11f0336d006fb7950
SHA25605c6b7bfb3b6806baf72de9719b45fe99da55a54783c23b43f555bb377e6816f
SHA5121ba8fe9333cb554cc5f63b2831b9ccfbb7559171cb1d07390f423f3e0a9ad0f099006b25cdf031211e8e46747c1ed9f231f871c525e8c98eefff2a9eb5cb7f4c
-
Filesize
2.4MB
MD5437c59059419449ff4d7cc13e76f37d6
SHA14c9eccde7f86ff9ecdd2c87dee253ed449720cdc
SHA256d6eb9206a59e2e128898337b3cd9bc6ac46cbac166005c4b22a462a33892612c
SHA512f9030f70ce5b4d478998335d89e0f38b14385d0a60bd8424f33279d043d45216655b19ccf3e691c65a82895d6478dc8f0f82a0777fd6e4b1d825dac4157ba987
-
Filesize
658KB
MD5d0f4632be7031cc372ffdd2d9063ffb2
SHA1b99f58ae5b6d169be95785a9a25ef27582e194c9
SHA2565f21fd414a3767df77f31be26352fc2fe63adbffc75ee48ae4ade06deef07b50
SHA512c620ceee308daf1cdd83568529042f17929dd4aa29d3d092b63fcd7b4751ff912247e68de2788c7d225a69f3d2c1dbfacdba2841c85a11308a029612e38c5595
-
Filesize
12KB
MD5233ee7e2ee296b042784729c186218b0
SHA1f4a1f31965baba5c3752c6c8bb54dd9b9b07b789
SHA2566b2a055879bc8a376345ff72a3d7946221528f7ea602c8bebace44a1b4419f10
SHA512142a0f4a03a7b68b59d4db780630d170f76ebfae8b888123af97112038f7071f1c75ab0313dc991d887e576ef4cc1e2b26eb24556a6466aa0ae3f3773a67a31d
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
361B
MD582337b5035b1921a4bc4356bf1617bfa
SHA1a67e1bec8872870dca2e9ded1931ce3ffa574cf5
SHA25673b63f0fb45723de9f8168ccbb9d42895fcfe3b55f74624bbf76516a4072ed8b
SHA51234040179006f484af0444cfadfc6f034c6320c4762061c22c829d7a37fb97f2747e8a950d43a0b7bf592e7487f64e9415da8faf8709b94a95dafbd65eb7c8b4d
-
Filesize
522B
MD5b70e8a232e8ef2244fb7cfed20812356
SHA18b926ecd44f2a80307955d52a99fc28db7fb2e21
SHA2569c7a64b3fb10dd8076a65fce61d3d86bae7b0db23368a58195f11f881c9e09b9
SHA512db1dc78e95ead9f3ef5ddba746f5f05c6bf29f4178b4d9df8aba41238775eb4b9e548700a147d4a9bb68ee70c2267e630a556eb11760fe688dfa5647ff375657
-
Filesize
359B
MD50f84b16ff6c542b88b1480760134d360
SHA1809a798cc5dd22127ead6d871f829f8e7f3f27c5
SHA256486ca5c3d3037978d13d5c8cd0cd19e0e61dbcb39d4a150a94d604fdb5fe07fa
SHA5123e97c83fdb00cd5118e678711d54be8714548d8fb340ba593c950be271f0fd37b730441d2cf3c2ce6b786ce722dd4dc4e80bebb4f8dfc5ca49164c43aaa49041
-
Filesize
522B
MD544c7ef44cf65f05c9e6674015dbbfda8
SHA10a5b622b0aa3735caf57ca93d9d629daf475e7ba
SHA256eea4f5b80a620df740543763c48863fcede74a9016a5531f5ece2eeff13487ee
SHA5123e2d397ae148d8c01714e88ead3249556bb2f8803218e22e460c898042c93a63c2d516e70fb346529a6fd2b5dea10a1f1f1bf12fce9721db392b194b4a7040d6
-
Filesize
4KB
MD5d8a6a6f2eb2ce36ce407ffa3f3b2fb1f
SHA1913662ea47edbb2a88049c190971a14ea27052fb
SHA25678fcabcc71e63f7d9958d85fd0eccfe3ba04686b4be32cbc4091bffc1f49b2b9
SHA512d1ff1df086e6b5b3794f7ec2fdbca7e0e667a6f7c567b2a3c996bd5a90fb7d0c3b4e603c5d1afaa183184240c9d40b2d63913ddb945994e7909785d4b4c57111
-
Filesize
5KB
MD5b61f86e78cb0b241c187cafcf3a9e6d9
SHA11c44516437885b25b45b96ea79a8a0a5bea56804
SHA25602767fa7ff203f6c0c048b76c9306dd3cf603a5ca9cee4c44881102966bea1f8
SHA5126c318c7261ebacbca91211e0c4d8d32d1b94f496986291335a2382eaae4631c0847527fc5e3363e0a9cf99fb930f87fc6f1dbfcd2fc23fc2d187b8f3038c5bd8
-
Filesize
4KB
MD5d6b47521a51165362ee693687caaaa51
SHA1d855218bc97ff4b34d5c785ee973d974fd7f407e
SHA256bcf433bf6b44be003a9c44b7d5b606a5586cbd517577efebb1afc4dcc1a7e519
SHA512c1e2bfed0e0ae30157027c68a831a126125477d75747743ae0fe41f8c2288acdd4df05c5abf9fc31685b5bbcb6b01d72a3e1e612a39287b6a4de497f3c202df1
-
Filesize
4KB
MD540d9ff89a4379463628b1b49db02e405
SHA17d80b737a93da50047df1dd08b668e93f421c882
SHA256ed3a1fd2ebf927836fab414990ba6ab5218fbc7c8f5bfae0e6f5afc0f1c1758f
SHA51219176b14557bedc81e6ac38fc29d7a58dd15aa4d60185879739f04c3ac2e65757ac9e3bd175a687dcae73acc7535cd64eacf401e850d6c9d36ba94f6cada18c7
-
Filesize
5KB
MD57a34efd2fa291d4e0fee6ffaa62c4113
SHA16c4f7de4bfc281a54a8fcf7f44fdb2fe15aa39fb
SHA2569b5474bc85797f3ff3c7957ec62f19b8eb91c140a1c29c186be7aafd3a175aa1
SHA51260674d9a69f56c480be31054fee365f9f4b10dcbfb3269daabe797483c8061261d0514c2acd4f0c633bee188fec07946aebded5a494a43727f8ca8d05d1623fb
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
429KB
MD562c61b5bc915f81c8038aa83ed1a3b01
SHA1d6e611c6bbc3f878e551d12c876b597cb88c2dbc
SHA256a4ed7c4c337c1068cfc4298b8c5e166a66a6f6697352b1f3df0b9c9b1428f353
SHA512919b4294152403a3be25127fb078a26e540ba5335454e29f865340fb6121c18078e0d1acb5f5d2deb8b8375932eb7d27f472060595020a258ae9639479fbfe53